Resubmissions

02-08-2024 22:25

240802-2b2jpsshmq 10

02-08-2024 21:27

240802-1a114swbkc 10

General

  • Target

    virus maker.exe

  • Size

    10.8MB

  • Sample

    240802-2b2jpsshmq

  • MD5

    c52d74582f80b10cff1f65c639f4ce68

  • SHA1

    4bc2fa54c7be20696503cbaf31ba99858d4c20bd

  • SHA256

    daf4dfe8aca14ee9e351a82ef60c2fc1b6f55e035635430296dbcadd855af7bb

  • SHA512

    0b90ba5d40f7cbc83528b3b2b8bdf9a2ceacf13ce3630477a595687c24567c7871f73fb2ec93ba0a0dbfde82c6c649cff102717b93345de5f7796a4c7f404795

  • SSDEEP

    196608:f8ys9SmePA+Jb3tQk5tOeNvX+wfm/pf+xfdkRGZWKsnwrIWOzW0DaqkH:0ycD+7v5tRvX+9/pWFGRsBsnwrIWeRaL

Malware Config

Targets

    • Target

      virus maker.exe

    • Size

      10.8MB

    • MD5

      c52d74582f80b10cff1f65c639f4ce68

    • SHA1

      4bc2fa54c7be20696503cbaf31ba99858d4c20bd

    • SHA256

      daf4dfe8aca14ee9e351a82ef60c2fc1b6f55e035635430296dbcadd855af7bb

    • SHA512

      0b90ba5d40f7cbc83528b3b2b8bdf9a2ceacf13ce3630477a595687c24567c7871f73fb2ec93ba0a0dbfde82c6c649cff102717b93345de5f7796a4c7f404795

    • SSDEEP

      196608:f8ys9SmePA+Jb3tQk5tOeNvX+wfm/pf+xfdkRGZWKsnwrIWOzW0DaqkH:0ycD+7v5tRvX+9/pWFGRsBsnwrIWeRaL

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks